Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/22/2019
02:30 PM
Ameesh Divatia
Ameesh Divatia
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

The Fact and Fiction of Homomorphic Encryption

The approach's promise continues to entice cryptographers and academics. But don't expect it to help in the real world anytime soon.

The history of homomorphic encryption stretches back to the late 1970s. Just a year after the RSA public-key scheme was developed, Ron Rivest, Len Adleman, and Michael Dertouzos published a report called "On Data Banks and Privacy Homomorphisms." The paper detailed how a loan company, for example, could use a cloud provider (then known as a commercial time-sharing service) to store and compute encrypted data. This influential paper led to the term "homomorphic encryption."

What Is Homomorphic Encryption?
Homomorphic encryption describes any encryption scheme in which a particular operation on two ciphertext values gives an encrypted result, which, when decrypted, maps to the result the operation would have been in plaintext. Because the keys are needed only during the initial encryption and final decryption, complete privacy of the inputs and outputs is maintained during the computation process.

The purpose of homomorphic encryption is to allow computation on encrypted data. The process describes the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.

Why It Works (At Least in Theory)
Homomorphic encryption can be a significant asset to your business compliance and data privacy efforts. We all know the regulatory landscape changed dramatically in 2018. The EU's General Data Protection Regulation (GDPR) came into force last May, the California Consumer Privacy Act (CCPA) is scheduled to be implemented on January 1, 2020, and as many as 40 other states are considering data privacy laws. GDPR was notable because of its penalty of 4% of global revenue for serious infractions, such as not having sufficient customer consent to process data. The CCPA is a "mini-GDPR" with unprecedented power for consumers to control the collection, use, and transfer of their own data.    

These new regulations came about as the result of significant breaches and abuses of data over the past few years. There is an undeniable data breach fatigue these days. But not every breach comes about as the result of outside attackers. There are other threat models to consider. Insider threats and privileged access account for about 35% to 60% of breaches, according to industry reports. Anthem and MyFitnessPal fell victim to this type of attack. Even using traditional encryption (encryption at rest and transparent data encryption, for example), database administrators have access to all of your data in the clear. They have access to the crown jewels.

Homomorphic encryption can also be a business enablement tool. It can allow cloud workload protection ("lift and shift" to cloud), cloud/aggregate analytics (or privacy preserving encryption), information supply chain consolidation (containing your data to mitigate breach risk), and automation and orchestration (operating and triggering off of encrypted data for machine-to-machine communication).

Where Homomorphic Encryption Falls Short
Homomorphic encryption originally slowed mathematical computations down to a crawl. The initial performance impact was 100 trillion times slower (not a typo). There has been significant performance improvement since then, but the latest figure is that about 50,000 end-to-end transactions can be performed in a certain range of time. That amount is still too small in today's fast-moving world.

Furthermore, homomorphic encryption requires application modifications. You need prior knowledge of what type of computation was being performed (additive, multiplication, etc.) Businesses with less predictable or more free-form operations will have to rewrite or modify applications to make homomorphic encryption viable. Again, that's not feasible for businesses at scale.

Finally, there are still questions about the overall encryption strength (encryption entropy). Homomorphic encryption exposes valuable properties in achieving this mechanism without decrypting this data, and without access to keys. There are still some open questions about the encryption strength using a scheme like this.

Putting It All Together
Homomorphic encryption is a long way off from real-world enterprise implementation, but there has been substantial progress in the areas of differential privacy and privacy preservation techniques. There are tools that can deliver homomorphic-like encryption without the inherent drawbacks that homomorphic encryption brings, so that businesses can mandate a higher security standard without actually breaking processes or application functionality.

Businesses should not have to sacrifice speed for security — it's not a zero-sum dynamic. When done properly, security can actually accelerate your business. Eliminating that friction between security and business leadership builds trust between departments and creates better security outcomes.

The promise of practical homomorphic encryption continues to entice cryptographers and academics. Although it is a rapidly developing area to watch, in practice, its poor performance to date makes homomorphic encryption impractical to implement in enterprise environments in the near future.

Related Content:

Ameesh Divatia is Co-Founder & CEO of Baffle, Inc., which provides encryption as a service. He has a proven track record of turning technologies that are difficult to build into successful businesses, selling three companies for more than $425 million combined in the service ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.